Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 10 Oct 2019 14:29:37 -0400
From:      David Cross <dcrosstech@gmail.com>
To:        Warner Losh <imp@bsdimp.com>
Cc:        FreeBSD Hackers <freebsd-hackers@freebsd.org>
Subject:   Re: uefisign and loader
Message-ID:  <CAM9edePsJuv-Vouc7RuBNpzEDUY2LE-q8Gs_xpyWrzZvSwxF5g@mail.gmail.com>
In-Reply-To: <CAM9edeP%2BbvKzOuuGMXLvgczzkaDCCuDJdH7C%2BnRanXp=3w6Fdg@mail.gmail.com>
References:  <CAM9edeOTrNev=izkp2R3C5A0geHRe51m71BPn1OrXSn_QWFaGQ@mail.gmail.com> <CANCZdfqdbKgRqF7AhsfjNwQdzbwA7uSuQoWzWvHQrwkJ2p4AXg@mail.gmail.com> <CAM9edeP%2BbvKzOuuGMXLvgczzkaDCCuDJdH7C%2BnRanXp=3w6Fdg@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
Ok, it appears uefisign is just outright broken; after not being able to
boot even boot1 signed, I brought the signed image over to windows and used
signtool verify and got the error message:
"SignTool Error: WinVerifyTrust returned error: 0x80096010
    The digital signature of the object did not verify."


This is a different error then I get form SignTool boot1.efi from an
untrusted cert (signed via SignTool) which reports:
"..A certificate chain processed, but terminated in a root certificate
which is not trusted..."


Anyone actually use uefisign successfully?

On Mon, Oct 7, 2019 at 9:29 AM David Cross <dcrosstech@gmail.com> wrote:

>
>
> On Mon, Oct 7, 2019 at 1:02 AM Warner Losh <imp@bsdimp.com> wrote:
>
>>
>>
>> On Sun, Oct 6, 2019, 10:58 PM David Cross <dcrosstech@gmail.com> wrote:
>>
>>> I've been working on getting secureboot working under freebsd (I today
>>> just
>>> finished off a REALLY rough tool that lets one tweak uefi authenticated
>>> variables under freebsd, with an eye to try to get a patch to put this
>>> into
>>> efivar).  After setting the PK, the KEK, and the db, I was super excited
>>> to
>>> finally secure-boot my machine, and discovered that I could not uefisign
>>> loader.  Attempting to sign loader returns a cryptic: "section points
>>> inside the headers" and then hangs in pipe-read (via siginfo). (this is
>>> under 12.0 FWIW).
>>>
>>> I am able to sign boot1, however boot1.efi doesn't handle GELI keys so
>>> its
>>> not really useful for me.
>>>
>>> Suggestions?
>>>
>>
>> Use loader.efi directly instead?
>>
>>>
>>>
> I currently do use loader.efi directly, however not being able to sign
> loader.efi directly complicates things a bit (using hash based signature
> lists for the 'db' variable); and it seems we *should* be able to sign
> loader.  From some other posts on the internet it seems that at some point
> we could.
>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAM9edePsJuv-Vouc7RuBNpzEDUY2LE-q8Gs_xpyWrzZvSwxF5g>